Sciweavers

129 search results - page 15 / 26
» Strong Accountability for Network Storage
Sort
View
AINA
2008
IEEE
13 years 9 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
IMC
2009
ACM
14 years 2 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
SAC
2009
ACM
14 years 2 months ago
Diverse peer selection in collaborative web search
Effective peer selection for intelligent query routing is a challenge in collaborative peer-based Web search systems, especially unstructured networks that do not have any central...
Le-Shin Wu, Filippo Menczer
INFOCOM
2011
IEEE
12 years 11 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 7 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...